This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discu...
This essential book for all software developers~~regardless of platform, language, or type of application~~outlines the “19 dead...
What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting...
This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are l...
The book is logically divided into 5 main categories with each category representing a major skill set required by most security...
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this o...
INTRODUCTION I have seen enough of one war never to wish to see another. —Thomas Jefferson I know not with what weapons World...